OTPulse

Vulnerabilities in the Network Communication Stack in Sinteso EN and Cerberus PRO EN Fire Protection Systems

Act Now10SSA-225840Mar 12, 2024
Attack VectorNetwork
Auth RequiredNone
ComplexityLow
User InteractionNone needed
Summary

Multiple buffer overflow vulnerabilities in the network communication stack of Sinteso EN and Cerberus PRO EN Fire Protection Systems. Successful exploitation could allow an unauthenticated attacker with network access to the fire protection system to execute arbitrary code or create a denial of service condition. Affected components include Engineering Tools, Fire Panels (FC20, FC72x), Cloud Distribution platforms (X200, X300), and mobile applications.

What this means
What could happen
An attacker could run arbitrary code on fire detection and alarm panels, potentially disabling fire alarms, suppressing alerts, or preventing emergency notifications. Denial of service attacks could also disable the fire protection system entirely, leaving facilities without automated fire detection and response.
Who's at risk
This affects critical safety infrastructure: municipal and industrial fire protection systems using Sinteso EN or Cerberus PRO EN platforms. Specific equipment at risk includes Engineering Tools, FC20 and FC72x Fire Panel controllers, X200/X300 Cloud Distribution appliances, and Sinteso Mobile clients. Any facility relying on these systems for fire detection, alarm generation, and emergency suppression logic is affected.
How it could be exploited
An attacker on the fire protection system network sends a specially crafted packet to the vulnerable network communication stack (ports/protocols unspecified in advisory). The buffer overflow in CWE-120/125/119 violations allows arbitrary code execution without authentication. Cloud Distribution and mobile clients are entry points if accessible from untrusted networks.
Prerequisites
  • Network access to the affected fire protection system (Sinteso EN or Cerberus PRO EN network segment)
  • No authentication required
  • Knowledge of vulnerable service ports and packet format (specific ports not disclosed in advisory)
Remotely exploitableNo authentication requiredLow complexity attackCritical CVSS 10.0High EPSS score (8.0%)Affects safety-critical fire protection systemsMany products have no fix availableEngineering Tools have no fix planned
Exploitability
Moderate exploit probability (EPSS 8.0%)
Affected products (32)
13 with fix19 pending
ProductAffected VersionsFix Status
Cerberus PRO EN Engineering ToolAll versions < IP8No fix yet
Cerberus PRO EN Engineering ToolAll versionsNo fix yet
Cerberus PRO EN Fire Panel FC72x IP6All versions < IP6 SR3No fix yet
Cerberus PRO EN Fire Panel FC72x IP6All versionsNo fix yet
Cerberus PRO EN Fire Panel FC72x IP7All versions < IP7 SR5No fix yet
Remediation & Mitigation
0/8
Do now
0/2
HARDENINGFor Engineering Tools and Fire Panels without available fixes, isolate affected systems on a dedicated fire protection network segment; implement firewall rules to restrict access to only authorized workstations and control panels
HARDENINGDisable remote access to Engineering Tools and Fire Panels if not required for operations; restrict Cloud Distribution appliances to communication from trusted internal networks only
Schedule — requires maintenance window
0/6

Patching may require device reboot — plan for process interruption

Sinteso Mobile
HOTFIXUpdate Sinteso Mobile to version 3.0.0 or later
Cerberus PRO EN X200 Cloud Distribution IP8
HOTFIXUpdate Cerberus PRO EN X200 Cloud Distribution IP8 to version 4.3.5618 or later
Cerberus PRO EN X300 Cloud Distribution IP8
HOTFIXUpdate Cerberus PRO EN X300 Cloud Distribution IP8 to version 4.3.5617 or later
Sinteso FS20 EN X200 Cloud Distribution MP8
HOTFIXUpdate Sinteso FS20 EN X200 Cloud Distribution MP8 to version 4.3.5618 or later
Sinteso FS20 EN X300 Cloud Distribution MP8
HOTFIXUpdate Sinteso FS20 EN X300 Cloud Distribution MP8 to version 4.3.5617 or later
All products
WORKAROUNDMonitor Siemens security advisories for promised fixes to Engineering Tools and Fire Panel versions; establish upgrade plan for products currently marked as 'no fix available'
↑↓ Navigate · Esc Close
API: /api/v1/advisories/ffd0373c-1fc0-462f-95cd-37c9918f86c8
Vulnerabilities in the Network Communication Stack in Sinteso EN and Cerberus PRO EN Fire Protection Systems | CVSS 10 - OTPulse